US 7634636 B2 Abstract Devices, systems and methods of reduced-power memory address generation. For example, an apparatus includes: a carry save adder including at least a first set of adders and a second set of adders, wherein the adders of the first set are able to receive a first number of input bits and to produce a first number of outputs, and wherein adders of the second set are able to receive a second number of input bits and to produce the first number of outputs.
Claims(22) 1. A method for generating a linear address comprising:
receiving a plurality (M) of N-bit address components, a first group of said N-bit address components comprising two address components in a format conforming to canonical address format and a second group comprising the other M-2 address components;
adding together the lower K bits of each of said M address components to produce the lower K bits of said linear address, wherein K is smaller than N; and
adding together the upper N minus K bits of said second group of address components to produce the upper N minus K bits of said linear address,
wherein in an address having canonical format each of the upper N-K bits of the address equals the K-th bit of said address.
2. The method of
checking whether said linear address is in accordance with a canonical format.
3. The method of
checking whether said linear address is canonical, based on the values of the upper N minus K plus 1 bits of said linear address and the K-th bit of each of said two canonical address components.
4. The method of
((( LA′[(N−1):(K−1)]='0::N−K+1)OR(LA′[(N−1):(K−1)]='1::N−K+1))AND NOT Canonical_Or),when: ((( LA′[(N−1):(K−1)]='0::N−K−1 & '10)OR(LA′[(N−1):(K−1)]='0::N−K & '1))AND Canonical_Xor),and when ((( LA′[(N−1):(K−1)]='0::N−K−1 & '11)OR(LA′[(N−1):(K−1)]'0::N−K−2 & '100))AND Canonical_And),wherein
Canonical_Or=the K-th bit of the first canonical address component OR the K-th bit of the second canonical address component,
Canonical_Xor=the K-th bit of the first canonical address component XOR the K-th bit of the second canonical address component,
Canonical_And=the K-th bit of the first canonical address component AND the K-th bit of the second canonical address component,
and wherein
OR denotes logical OR,
AND denotes logical AND,
NOT denotes logical NOT,
XOR denotes logical XOR,
LA′ denotes said linear address.
5. The method of
6. The method of
7. The method of
8. An apparatus comprising:
an adder to receive a plurality (M) of N-bit address components, a first group of said N-bit address components comprising address components in a format conforming to canonical address format and a second group comprising the other M-2 address components, said adder to produce a N-bit linear address, said adder comprising:
a first set of adders to receive the lower K bits of each of said M address components, to add together said lower K bits and to produce the lower K bits of said linear address, wherein K is smaller than N; and
a second set of adders to receive the upper N minus K bits of said second group of address components, to add together said upper N minus K bits and to produce the upper N minus K bits of said linear address,
wherein in an address having canonical format each of the upper N-K bits of the address equals the K-th bit of said address.
9. The apparatus of
a validator to check whether said linear address is in accordance with a canonical format.
10. The apparatus of
11. The apparatus of
12. The apparatus of
((( LA′[(N−1):(K−1)]='0::N−K+1)OR(LA′[(N−1):(K−1)]='1::N−K+1))AND NOT Canonical_Or),when: ((( LA′[(N−1):(K−1)]='0::N−K−1 & '10)OR(LA'[(N−1):(K−1)]='0::N−K & '1))AND Canonical_Xor),and when ((( LA′[(N−1):(K−1)]='0::N−K−1 & '11)OR(LA′[(N−1):(K−1)]'0::N−K−2 & '100))AND Canonical_And),wherein
Canonical_Or=the K-th bit of the first canonical address component OR the K-th bit of the second canonical address component,
Canonical_Xor=the K-th bit of the first canonical address component XOR the K-th bit of the second canonical address component,
Canonical_And=the K-th bit of the first canonical address component AND the K-th bit of the second canonical address component,
and wherein
OR denotes logical OR,
AND denotes logical AND,
NOT denotes logical NOT,
XOR denotes logical XOR,
LA′ denotes said linear address.
13. The apparatus of
14. The apparatus of
15. A system comprising:
a dynamic random access memory to store data; and
an address generation unit to receive a plurality (M) of N-bit address components, a first group of said N-bit address components comprising two address components in a format conforming to canonical address format and a second group comprising the other M-2 address components, said address generation unit further to produce a N-bit linear address, the address generation unit comprising:
a first cell to receive the lower K bits of each of said M address components, to add together said lower bits and to produce the lower K bits of said linear address, wherein K is smaller than N; and
a second cell to receive the upper N minus K bits of said second group of address components, to add together said upper N minus K bits and to produce the upper N minus K bits of said linear address,
wherein in an address having canonical format each of the upper N-K bits of the address equals the K-th bit of said address.
16. The system of
17. The system of
18. The system of
19. The system of
((( LA′[(N−1):(K−1)]='0::N−K+1)OR(LA′[(N−1):(K−1)]='1::N−K+1))AND NOT Canonical_Or),when: ((( LA′[(N−1):(K−1)]='0::N−K−1 & '10)OR(LA′[(N−1):(K−1)]'0::N−K & '1))AND Canonical_Xor),and when ((( LA′[(N−1):(K−1)]='0::N−K−1 & '11)OR(LA′[(N−1):(K−1)]='0::N−K−2 & '100))AND Canonical_And),wherein
Canonical_Or=the K-th bit of the first canonical address component OR the K-th bit of the second canonical address component,
Canonical_Xor=the K-th bit of the first canonical address component XOR the K-th bit of the second canonical address component,
Canonical_And=the K-th bit of the first canonical address component AND the K-th bit of the second canonical address component,
and wherein
OR denotes logical OR,
AND denotes logical AND,
NOT denotes logical NOT,
XOR denotes logical XOR,
LA′ denotes said linear address.
20. The system of
21. The system of
22. The system of
Description In the field of computing, a computing system may utilize one or more references to a memory address. For example, a logical address may be referenced by an assembler language code; a linear address (LA) may be generated by an address generation unit (AGU) based on the logical address and one or more virtual address (VA) components; and a physical address (PA) may b produced by a data translation lookaside buffer (DTLB) based on the linear address. An increase in storage capacity of memory units results in utilization of longer memory references, for example, 48-bit or 64-bit memory references. Unfortunately, a larger number of hardware components and increased power consumption may be associated with generation of longer memory references and validation of compliance of a longer memory reference with architecture-defined formats. The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with features and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanied drawings in which: It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those of ordinary skill in the art that the invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, units and/or circuits have not been described in detail so as not to obscure the invention. Embodiments of the invention may be used in a variety of applications. Although embodiments of the invention are not limited in this regard, embodiments of the invention may be used in conjunction with many apparatuses, for example, a computer, a computing platform, a personal computer, a desktop computer, a mobile computer, a laptop computer, a notebook computer, a personal digital assistant (PDA) device, a tablet computer, a server computer, a network, a wireless device, a wireless station, a wireless communication device, or the like. Embodiments of the invention may be used in various other apparatuses, devices, systems and/or networks. Although embodiments of the invention are not limited in this regard, discussions utilizing terms such as, for example, “processing,” “computing,” “calculating,” “determining,” “establishing”, “analyzing”, “checking”, or the like, may refer to operation(s) and/or process(es) of a computer, a computing platform, a computing system, or other electronic computing device, that manipulate and/or transform data represented as physical (e.g., electronic) quantities within the computer's registers and/or memories into other data similarly represented as physical quantities within the computer's registers and/or memories or other information storage medium that may store instructions to perform operations and/or processes. Although embodiments of the invention are not limited in this regard, the terms “plurality” and/or “a plurality” as used herein may include, for example, “multiple” or “two or more”. The terms “plurality” and/or “a plurality” may be used herein describe two or more components, devices, elements, parameters, or the like. For example, a plurality of elements may include two or more elements. Although portions of the discussion herein may relate, for demonstrative purposes, to a memory “address” which may be generated, produced, created, handled, validated, verified, checked, accessed, or the like, embodiments of the invention are not limited in this regard. For example, other memory references may be used in accordance with embodiments of the invention, e.g., a memory reference, a memory pointer, a memory alias, a “shortcut” to a memory cell or to a memory line, or the like. Although portions of the discussion herein may relate, for demonstrative purposes, to a memory address which may be referenced using a 64-bit data item, and/or to a memory address which may be referenced using 48 bits of a 64-bit data item, embodiments of the invention are not limited in this regard. For example, other lengths or sizes of data items or portions thereof may be used to reference a memory address in accordance with embodiments of the invention. Although portions of the discussion herein may relate, for demonstrative purposes, to reference to a “memory” address, embodiments of the invention are not limited in this regard. For example, some embodiments of the invention may be utilized in conjunction with references to portions or sites of a storage unit, a long term storage unit, a short term storage unit, a physical memory unit, a virtual memory unit, a volatile or non-volatile memory unit, or the like. Computing system Computing system In some embodiments, for example, FSB Computing system Computing system Computing system Processors Processors Processors Computing system Subsystem AGU In some embodiment, for example, the memory address may be represented using N bits, such that K bits out of the N bits may refer to a location or portion of memory In some embodiments, for example, a memory address generated by AGU The CSA Although portions of the discussion herein may relate, for demonstrative purposes, to CSA Although portions of the discussion herein may relate, for demonstrative purposes, to a first set of adders The CSA In some embodiments, for example, CSA In accordance with some embodiments of the invention, the first set of adders In some embodiments, for example, CSA In some embodiments, although the second set of adders In some embodiments, the address components In some embodiments, for example, the AGU In some embodiments, for example, the segment base (e.g., address component In some embodiments, for example, the following statements may be defined and/or used:
For example, Statement 1 may relate to a demonstrative example in which all the upper 16 bits (out of 64 bits) of the segment base have a value of zero, and all the upper 16 bits (out of 64 bits) of the displacement have a value of zero. As indicated in Statement 1, the parameter Canonical_Or may return a value of one if the 48th bit of the displacement component has a value of one, or if the 48th bit of the segment base component has a value of one, of if the 48th bit of the displacement component has a value of one and the 48th bit of the segment base component has a value of one; otherwise, the parameter Canonical_Or may return a value of zero. Similarly, for example, Statement 3 may relate to a demonstrative example in which all the upper 16 bits (out of 64 bits) of the segment base have a value of one, and all the upper 16 bits (out of 64 bits) of the displacement have a value of one. As indicated in Statement 1, the parameter Canonical_And may return a value of one if the 48th bit of the displacement component has a value of one and the 48th bit of the segment base component has a value of one; otherwise, the parameter Canonical_And may return a value of zero. In contrast, for example, Statement 2 may relate to a demonstrative example in which all the upper 16 bits (out of 64 bits) of the segment base have a value of zero, and all the upper 16 bits (out of 64 bits) of the displacement have a value of one, or vice versa. As indicated in Statement 2, the parameter Canonical_Xor may return a value of one if the 48th bit of the displacement component has a value of one and the 48th bit of the segment base component has a value of zero; or, if the 48th bit of the displacement component has a value of zero and the 48th bit of the segment base component has a value of one; otherwise, the parameter Canonical_Xor may return a value of zero. In some embodiments, for example, CSA In some embodiments, for example, the following equation may be used:
In some embodiments, the following pseudo-code may be used to check whether or not a generated memory address is canonical:
In Code 1, the denotation LA′ denotes the candidate LA generated; the denotation LA′[ For example, the first IF statement in Code 1 may check whether all the upper 17 bits of LA′ have a value of zero, or whether all the upper 17 bits of LA′ have a value of one. If this condition holds true, and a Canonical_Or statement (Statement 1) does not hold true, then it may be determined that LA′ is canonical. In some embodiments, the first IF statement in Code 1 may correspond to Statement 1 discussed above. In some embodiments, for example, the first IF statement in Code 1 may handle a demonstrative example in which all the upper 16 bits of the displacement address component have a value of zero, and all the upper 16 bits of the segment base address component have a value of zero. Accordingly, the sum of the upper 16 bits of the displacement address component and the upper 16 bits of the segment base address component includes 16 values of zero. If, in addition, the 48th bit of the displacement address component (denoted displacement [47] in Statement 1) has a value of zero, and the 48th bit of the segment base address component (denoted segment_base [47] in Statement 1) has a value of zero, then the Canonical_Or parameter returns a value of one. Since all the upper 17 bits of the displacement address component have a value of zero, and all the upper 17 bits of the segment base address component have a value of zero, the first IF statement in Code 1 assigns a value of zero to the Canonical_Fault parameter, since the upper 16 bits of the displacement address component and the upper 16 bits of the segment base address component do not affect the calculation of the LA and need not be added by CSA Similarly, the second IF statement in Code 1 may check whether the upper 17 bits of LA′ include a sequence of 15 zero values followed by a one value and a zero value; or whether the upper 17 bits of LA′ include a sequence of 16 zero values followed by a one value. If this condition holds true, and a Canonical_Xor statement (Statement 2) holds true, then it may be determined that LA′ is canonical. In some embodiments, the second IF statement in Code 1 may correspond to Statement 2 discussed above. Similarly, the third IF statement in Code 1 may check whether the upper 17 bits of LA′ include a sequence of 15 one values followed by two one values; or whether the upper 17 bits of LA′ include a sequence of 14 zero values followed by a one value and two zero values. If this condition holds true, and a Canonical_And statement (Statement 3) holds true, then it may be determined that LA′ is canonical. In some embodiments, the third IF statement in Code 1 may correspond to Statement 3 discussed above. In contrast, if none of the conditions checked by the three IF statements of Code 1 holds true, then it may be determined that LA′ is non-canonical. In some embodiments, the following demonstrative tables may be used:
In Tables 1-4, the first row is divided into 17 columns numbered 47 through 63, corresponding to the 48th through 64th bit. The second row indicates the values of the upper 17 bits of the LA′ as generated by the AGU In some embodiments, Tables 1-4 or other suitable tables may be used, for example, to determine that the LA′ generated by AGU For example, Tables 1 and 2 may correspond to the second IF statement of Code 1. As shown in Table 1, the upper bits of LA′ include a sequence of 15 values of zero, followed by a value of one and a value of zero; this structure corresponds to the first comparison of the second IF statement of Code 1. Similarly, as shown in Table 2, the upper bits of LA′ include a sequence of 16 values of zero, followed by a value of one; this structure corresponds to the second comparison of the second IF statement of Code 1. Similarly, Tables 3 and 4 may correspond to the third IF statement of Code 1. As shown in Table 3, the upper bits of LA′ include a sequence of 14 values of zero, followed by a value of one and two values of zero; this structure corresponds to the second comparison of the third IF statement of Code 1. Similarly, as shown in Table 4, the upper bits of LA′ include a sequence of 15 values of zero, followed by two values of one; this structure corresponds to the first comparison of the third IF statement of Code 1. In some embodiments, for example, CSA In some embodiments, one or more of the operands (e.g., the address components) may be extended, for example, using sign-extension and/or zero-extension. In some embodiments, for example, an operand may be sign-extended from K bits to N bits, e.g., by appending to the operand a sequence of one or more copies of the sign bit, for example, a sequence repeating N minus K times the sign bit of the operand. In some embodiments, for example, an operand may be zero-extended from K bits to N bits, e.g., by appending to the operand a sequence of one or more zero values, for example, a sequence repeating N minus K times a zero value. In some embodiments, it may be determined to zero-extend an operand (e.g., an address component) instead of to sign-extend the operand, even if the zero-extend may modify the value of the operand (e.g., if the unmodified operand is negative); the determination may be performed, for example, if it is expected that the extended portion of the operand may not affect whether or not the generated memory address is canonical. Some embodiments may allow, for example, a decrease in hardware components and/or a decrease in power consumption. For example, instead of using a 64-bit reducer CSA to add four 64-bit operands of address components (e.g., by reducing the four 64-bit operands into two 64-bit sum/carry vectors, and then adding the two 64-bit carry/sum vectors using a KS adder), some embodiments of the invention may utilize a reduced-power circuit and/or reduced-hardware circuit. For example, a 48-bit CSA having four inputs and two outputs may be used to add the lower 48 bits of the four operands of address components; and a secondary (e.g., “degenerate”) adder, e.g., a 16-bit CSA having two inputs and two outputs, may be used to add the upper 16 bits of only two out of the four operands of address components (namely, to add the upper 16 bits of the base component and the upper 16 bits of the index*scale component). In one embodiment, for example, power leakage calculations may indicate a possible power saving of approximately 23 percent. In some embodiments, optionally, AGU In some embodiments, memory address user In some embodiments, validator As indicated at block As indicated at block As indicated at block In some embodiments, the operations of blocks In some embodiments, optionally, for example, it may be determined to perform the operations of block As indicated at block As indicated at block Other suitable operations or sets of operations may be used in accordance with embodiments of the invention. Some embodiments of the invention may be implemented by software, by hardware, or by any combination of software and/or hardware as may be suitable for specific applications or in accordance with specific design requirements. Embodiments of the invention may include units and/or sub-units, which may be separate of each other or combined together, in whole or in part, and may be implemented using specific, multi-purpose or general processors or controllers, or devices as are known in the art. Some embodiments of the invention may include buffers, registers, stacks, storage units and/or memory units, for temporary or long-term storage of data or in order to facilitate the operation of a specific embodiment. Some embodiments of the invention may be implemented, for example, using a machine-readable medium or article which may store an instruction or a set of instructions that, if executed by a machine, for example, by processor While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents may occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention. Patent Citations
Classifications
Legal Events
Rotate |